End-to-middle Security in the Session Initiation Protocol (SIP)
draft-ietf-sip-e2m-sec-06

 
Document Type Expired Internet-Draft (sip WG) - resurrect requested by Cullen Jennings
Last updated 2008-01-12 (latest revision 2007-07-11)
Stream IETF
Intended RFC status Proposed Standard
Formats
Expired & archived
plain text pdf html
Stream WG state WG Document
Document shepherd No shepherd assigned
IESG IESG state Expired (IESG: Dead)
Telechat date
Responsible AD Cullen Jennings
IESG note PROTO shepherd is Dean Willis
Send notices to fluffy@cisco.com, tachimoto.shinya@lab.ntt.co.jp, sip-chairs@ietf.org, kumiko@cs.columbia.edu, rohan.mahy@plantronics.com

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-ietf-sip-e2m-sec-06.txt

Abstract

Some services provided by intermediaries depend on their ability to inspect a message body in the Session Initiation Protocol (SIP). When sensitive information is included in the message body, a SIP User Agent (UA) needs to protect it from other intermediaries than those that the UA agreed to disclose it to. This document proposes a mechanism for securing information passed between an end user and intermediaries using S/MIME. It also proposes mechanisms for a UA to discover intermediaries which need to inspect an S/MIME-secured message body, or to receive the message body with data integrity This specification is approved at the proposed standards level due to the IANA registration requirements. Is is of sufficient quality for that level, however, the use of this mechanism in this specification are considered experimental.

Authors

Kumiko Ono (ono.kumiko@lab.ntt.co.jp)
Shinya Tachimoto (tachimoto.shinya@lab.ntt.co.jp)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)